Search This Blog

Caltech professor claims Israeli spy infiltrated JPL

UPDATE: I WAS INFORMED BY THE WESTERN AUSTRALIAN POLICE TODAY (25TH NOVEMBER, 2014), AT APPROXIMATELY 1030HRS, THAT IF I DID NOT REMOVE ALL REFERENCES TO [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP] I WOULD BE ARRESTED AS HAVING VIOLATED MY BAIL CONDITIONS NOT TO "OFFEND" ANYONE VIA ELECTRONIC MEANS. IT WAS REPORTED TO ME BY DETECTIVES THAT [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP] WAS VERY "OFFENDED" BUT WAS A GENTLEMAN AND DID NOT DEMAND MY ARREST BUT SIMPLY WANTED ANY REFERENCE TO HIMSELF REMOVED BY 5PM TODAY. I HAVE FULFILLED THIS OBLIGATION.

IT SHOULD BE NOTED THAT I AM NOT RESPONSIBLE FOR WEBSITES AND BLOGS THAT CHOOSE TO REPOST THIS MATERIAL. I WILL ENDEAVOR HOWEVER TO LIAISE WITH IDENTIFIABLE AUTHORS TO REMOVE ALL REFERENCE TO [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP] SO AS TO AVOID HARM TO BOTH MYSELF AND MY FAMILY AND THE LOSS OF PERSONAL PROPERTY AND LIBERTY. I REPEAT, PLEASE CONSIDER MY SAFETY AND SECURITY WHEN RE-POSTING THIS MATERIAL. I COULD BE SENT TO JAIL AND EASILY KILLED OR SEVERELY INJURED.

I DO NOT BLAME THE STATE POLICE FOR THIS - THEY ARE MERELY ACTING UNDER ORDERS AND IN FACT MANY HAVE RE-ITERATED TO ME THEIR DISGUST AT THE ISRAELI STATE, JEWISH SUPREMACISM AND ISRAELI INTELLIGENCE ACTIVITY IN THIS COUNTRY AND ELSEWHERE. SO PLEASE, SAVE YOUR INVECTIVE FOR THOSE WHO SEEK TO STIFLE DEBATE OF SUBJECTS "IN THE PUBLIC INTEREST" AND WHO SEEK TO SUBVERT OUR COUNTRIES CONSTITUTIONAL MONARCHICAL PARLIAMENTARY DEMOCRACY, NATIONAL SOVEREIGNTY AND NATIONAL SECURITY.

Now this is exactly what I am talking about in this previous video I made on the subject of reporting Israeli and Jewish spying.

Sandra Troian

Rocket Science Espionage?

November 17, 2014

By

Did
the California Institute of Technology ignore faculty reports that an
Israeli spy might be working at a campus-controlled research facility so
as not to jeopardize an $8 billion National Aeronautics and Space
Administration contract? That’s the basis of a whistleblower suit
filed last week against Caltech by Sandra Troian, a professor of
applied physics there who says the university, after dismissing her
concerns, tried to retaliate against her for speaking with federal
authorities during their own investigation into the matter.

According to the suit, Troian hired Amir Gat, a recent Ph.D. in
aerospace engineering from Technion-Israel Institute of Technology, in
early 2010, to help design a new type of space micropropulsion system.
The project, funded by the Defense Advanced Research Projects Agency,
allegedly was subject to federal export control laws governing
unauthorized sharing of information, and Troian says she and Gat signed
agreements saying they would protect security-sensitive research.

The Technion was started up by Israeli Military Intelligence under a program called "Operation Talpiot". Here, the best minds are nurtured by the Israeli Defence Force to go out into the private sector and design and build hardwear and software solutions for both the private and government sector. THE GRADUATES ARE ALL SPIES FOR THE STATE OF ISRAEL.

Watch the above video for the EXACT explanation of what scientist Sandra Troian and the FBI were trying to expose.

Of further interest -

He is also alleged to have purposely entered erroneous numbers into
design software codes. Later in 2010, a computer virus attack on
Troian’s work computer resulted in hundreds of files being uploaded to
an IP address outside Caltech, and days of interruption to Troian's
network.

This is the exact same activities that led to the 'catastrophe' of the "Heartbleed" bug that allowed massive computer systems to be compromised - revealing the contents of memory - passwords, encryption - to the attacker. Heartbleed was considered the greatest coding "mistake" ever -

The Heartbleed Bug is a serious vulnerability in the
popular OpenSSL cryptographic software library. This weakness allows
stealing the information protected, under normal conditions, by the
SSL/TLS encryption used to secure the Internet. SSL/TLS provides
communication security and privacy over the Internet for applications
such as web, email, instant messaging (IM) and some virtual private
networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read
the memory of the systems protected by the vulnerable versions of the
OpenSSL software. This compromises the secret keys used to identify the
service providers and to encrypt the traffic, the names and passwords of
the users and the actual content. This allows attackers to eavesdrop on
communications, steal data directly from the services and users and to
impersonate services and users.

In 2011, one of the RFC's authors, Robin Seggelmann, then a Ph.D. student at the University of Duisburg-Essen, implemented the Heartbeat Extension for OpenSSL. Following Seggelmann's request to put the result of his work into OpenSSL,[23][24][25]
his change was reviewed by Stephen N. Henson, one of OpenSSL's four
core developers. Henson failed to notice a bug in Seggelmann's
implementation, and introduced the flawed code into OpenSSL's source
code repository on December 31, 2011. The vulnerable code was adopted
into widespread use with the release of OpenSSL version 1.0.1 on March
14, 2012. Heartbeat support was enabled by default, causing affected
versions to be vulnerable.

These two who "missed" the coding error didn't train at the Technion in Israel did they?

Funnily, the man who was instrumental in getting me locked away for three years in jail also trained at the Technion in Israel - Mr [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP].

In the above video at approximately 7:15 in, you will see our little Aussie Jewish Sayanim (helper for Israeli Intelligence) [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP]. gloating on my incarceration for three years -

[NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP]. also served in the Israeli Defence Force in the mid 1970's.

SAYANIMS like [NAME REMOVED UNDER THREAT OF ARREST BY WESTERN AUSTRALIAN STATE SECURITY INVESTIGATION GROUP]. are all over Western Institutions. They are in our military and sensitive government departments. They have their compromised hardware in our communications network. They are present in private corporations and give sensitive corporate intelligence to Israeli companies. Let me give you an example - in 2010 I met a guy who worked in wholesale IT equipment ordering and sales. He had received an order from a large Australian company called "Co-Operative Bulk Handling" for a hundred RAD GROUP routers direct from Israel. He stated to the customer that is was far cheaper and far easier to order routers from Singapore and not from Israel. The CBH I.T employee was adamant - the routers had to come from Israel. Not long after we had the explosive allegations of massive bribery of Iraqi officials by the Australian Wheat Board. the AWB is a "sister" company of CBH - did the Israeli's get sensitive information from compromised (back doored) RAD GROUP routers that allowed them to end the lucrative and friendly trade deals with Iraq?

RAD GROUP are a massive company born directly out of OPERATION TALPIOT and the king of Technion, Zohar Zispel, who features in the top video.

Comments

Post a Comment

Popular posts from this blog

To Understand Globalist Zionist Power And How It Rules From Israel, You Must Understand These Words - "THE TALPIOT PROGRAM" and "THE TECHNION"
"Information Is Power"THIS POST IS LONG, DETAILED, BUT WORTH TAKING THE TIME TO READ AND WATCH THE VIDEO'S. I AM IN EXILE IN MALAYSIA AS I UPDATE THE PAGE (4th August 2017) IN THIS BLOG POST YOU WILL LEARN -1) How Israel planned over 40 years ago to dominate the high technology communications sector. 2) How Israel trained officers from Israeli Military Intelligence to become private entrepreneurs. Now they dominate both the public and private high technology sector. 3) How this plan was titled "Operation Talpiot - The Talpiot Program". 4) How Israel dominates databases of all kinds from banking to medical, to policing, to NSA sub contractors, to government encrypted communications, to video surveillance systems for Class A critical infrastructure. 5) How Israel and Jewish Power have a tradition of the Sa…

Below is a picture of the Perth District Court - where I was tried. I had a hearing on January 11th 2011 requesting another venue as it was improper to be tried in a "Jewish Temple". I guess you find that notion pretty silly eh? Well, just check out the front of the court. Whats that "pyramid" emblem mean?

It should be either the state coat of arms or more properly, the "Royal Seal" -

But instead, we have a "pyramid" emblem. This is very important because it shows from where the "lawful authority" is flowing and according to that emblem on the front of the Perth District Court it isn't the Australian Commonwealth Constitution and the Monarch. It's something else. What is it?

Here is another pyramid on another court building -

The above is the Israeli Supreme Court building in Jerusalem. Shit gets deeper. Do you like the "all seeing eye" on the top of the pyramid? Looks a bit like this one -

"To call what happened incredible is an understatement. The lawyers did nothing (literally) for six months in total. They did nothing for four months with $10,000 deposited in the trust account."
Me thinks DFAT - Department of Foreign Affairs and Trade - Australian Foreign Office and Julie Bishop had something to do with this. See bottom of page.

Instructing solicitor Kevin Foley stated six times in a recorded call (below) that he feared for his safety and that of his staff. I told him to contact DFAT and ask for protection from...THE ISRAELI STATE! Kevin is a high profile well known instructing solicitor in Australia. This isn't ME saying I'm scared - this is a high level legal professional who has friends who have been activists in Palestine.